2021 International Conference on Engineering and Emerging Technologies (ICEET) 2021
DOI: 10.1109/iceet53442.2021.9659710
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Learning-based Detection Approaches of the Kernel-level Rootkit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 28 publications
0
0
0
Order By: Relevance
“…Rootkits [54] are suspected to be the biggest threat and major security vulnerability in protecting user data. This malware is designed or installed in such a way that it cannot be easily detected by anti-malware software and can stop the detection methods by exploiting the vulnerabilities of system software [55]. Intruders can take control of the user system unexpectedly and modify the user security information.…”
Section: Integrity Attackmentioning
confidence: 99%
“…Rootkits [54] are suspected to be the biggest threat and major security vulnerability in protecting user data. This malware is designed or installed in such a way that it cannot be easily detected by anti-malware software and can stop the detection methods by exploiting the vulnerabilities of system software [55]. Intruders can take control of the user system unexpectedly and modify the user security information.…”
Section: Integrity Attackmentioning
confidence: 99%
“…The decryptor's small size compared to the main body reduces detection probability. Encryption complexity ranges from basic operations to strong encryption methods [22], [23], [27]. • Oligomorphism and polymorphism: the encryption technique's limitation lies in the constant decryptor across exploitations, enabling detection based on code patterns.…”
Section: Malware Fundamentalsmentioning
confidence: 99%